Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 21:16
Static task
static1
Behavioral task
behavioral1
Sample
90lh34776t.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
90lh34776t.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
90lh34776t.exe
-
Size
221KB
-
MD5
7729900697d95c9cb6d5bd73888cf13b
-
SHA1
43bb970f69404ff4c01427b99cfb669a4575d0cd
-
SHA256
b8f987a5099e1a1a220893763f00bcff9d84ed2dd49cb4a0ab8f5c595281e5ac
-
SHA512
d7cc1b6c5527da43c8cb4bbc04c356b2cb85849a847c342da6c85d610614096805f6946365f92252276b96a0bc9767c7979dfd358a6e20e752bd08d69850190f
-
SSDEEP
6144:wBlL/LrAY7sjzeUc1/8Lan+V6KqjWw04DzlBX:Cp/g/2bna6Kn4nlh
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4432 90lh34776t.exe 4432 90lh34776t.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 372 4432 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90lh34776t.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4432 wrote to memory of 2136 4432 90lh34776t.exe 83 PID 4432 wrote to memory of 2136 4432 90lh34776t.exe 83 PID 4432 wrote to memory of 2136 4432 90lh34776t.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\90lh34776t.exe"C:\Users\Admin\AppData\Local\Temp\90lh34776t.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\90lh34776t.exe"C:\Users\Admin\AppData\Local\Temp\90lh34776t.exe"2⤵PID:2136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 9242⤵
- Program crash
PID:372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4432 -ip 44321⤵PID:224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD556a321bd011112ec5d8a32b2f6fd3231
SHA1df20e3a35a1636de64df5290ae5e4e7572447f78
SHA256bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1
SHA5125354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3